shim-ia32 vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the shim-ia32 package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
Improper Validation of Specified Type of Input

*
  • L
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • L
Access of Resource Using Incompatible Type ('Type Confusion')

*
  • L
Out-of-bounds Write

*
  • L
NULL Pointer Dereference

*
  • L
NULL Pointer Dereference

*
  • L
Improper Validation of Specified Quantity in Input

*
  • L
Allocation of Resources Without Limits or Throttling

*
  • L
Missing Required Cryptographic Step

*
  • M
Improper Handling of Parameters

*
  • L
Out-of-bounds Write

*
  • L
Covert Timing Channel

*
  • L
Information Exposure

*
  • H
Out-of-bounds Read

<0:15.8-4.el8_9
  • H
Integer Overflow or Wraparound

<0:15.8-4.el8_9
  • H
Origin Validation Error

<0:15.8-4.el8_9
  • H
Out-of-bounds Read

<0:15.8-4.el8_9
  • H
Out-of-bounds Read

<0:15.8-4.el8_9
  • H
NULL Pointer Dereference

<0:15.8-4.el8_9
  • L
Resource Exhaustion

*
  • M
Improper Certificate Validation

*
  • L
Improper Certificate Validation

*
  • L
Resource Exhaustion

*
  • H
Buffer Overflow

<0:15.6-1.el8
  • H
Inclusion of Functionality from Untrusted Control Sphere

<0:15.6-1.el8
  • H
Integer Underflow

<0:15.6-1.el8
  • H
Out-of-bounds Write

<0:15.6-1.el8
  • H
Use After Free

<0:15.6-1.el8
  • H
Out-of-bounds Write

<0:15.6-1.el8
  • H
Out-of-bounds Write

<0:15.6-1.el8
  • H
Out-of-bounds Write

<0:15.6-1.el8
  • M
Out-of-bounds Write

<0:15.4-2.el8_1
  • M
Out-of-bounds Write

<0:15.4-2.el8_1
  • M
Stack-based Buffer Overflow

<0:15.4-2.el8_1
  • M
Out-of-bounds Write

<0:15.4-2.el8_1
  • M
Improper Authorization

<0:15.4-2.el8_1
  • M
Use After Free

<0:15.4-2.el8_1
  • M
Incomplete Blacklist

<0:15.4-2.el8_1
  • M
Integer Overflow or Wraparound

<0:15-14.el8_2
  • M
Out-of-bounds Write

<0:15-14.el8_2
  • M
Expected Behavior Violation

<0:15-14.el8_2
  • M
Integer Overflow or Wraparound

<0:15-14.el8_2
  • M
Integer Overflow or Wraparound

<0:15-14.el8_2
  • M
Use After Free

<0:15-14.el8_2
  • M
Integer Overflow or Wraparound

<0:15-14.el8_2
  • M
Integer Overflow or Wraparound

<0:15-14.el8_2